Premium Essay

Hardware & Software Concepts

In:

Submitted By princeossei
Words 572
Pages 3
1. Why is a peer-to-peer architecture not desirable in a business environment? Peer-to-peer architecture is not desired in a business environment because it is difficult or impossible to establish centralized control to restrict inappropriate access and to ensue data integrity.
2. How many instructions can be executed by a single computer’s CPU at a time? A single CPU can only process one instruction at a time.
3. What are the 4 components of a computer system? Hardware, input devices, output devices, and software is all components of a computer system.
4. The hierarchical division of a complex system that contains additional subsystems into its 
component part is known as what? This hierarchical division is known as decomposition.
5. Explain what are bits and bytes within a computer’s memory structure? Bits and bytes are memory that holds different patterns. Each digit in a binary number is known as a bit. 6. What is the function of computer software?
Data that provides the instructions for telling a computer what to do and how to do it.
7. Explain the function of I/O components and give at least three examples.
Input components- Keyboard, mouse, CD/DVD, mic
Output components- Speaker, printer, monitor, usb devices
8. What is the area along the boundary of a system that links the system’s components to the 
surrounding environment called? The area along the boundary of a system that links the system’s components to the 
surrounding environment is called interface
9. What does the CGI (Common Gateway Interface) do within a client server three-tier 
environment? A protocol for making communication between the Web server and the database application possible.

10. Explain the difference between ROM and RAM memory within a computer?
RAM- Random access memory/ the main memory
ROM- Read-only memory
11. Explain the difference

Similar Documents

Premium Essay

Example

...of computer hardware and software concepts or as a study of how IT helps organizations accomplish strategic accounting goals. It is helpful to view an accounting information system as a set of five interacting components: (1) hardware, (2) software, (3) data, (4) people, and (5) procedures. Computer hardware is probably the most tangible element in this set, but ‘‘hardware’’ is only one piece of the pie—and not necessarily the most important piece. For example, most organizations spend more money on people (in wages and salaries) than on computer hardware and software combined. Similarly, computer hardware must work together with the other system components to accomplish data processing tasks. Without computer software, for example, the hardware would stand idle. Without data to process, both the hardware and the software would be useless. Without procedures, accounting data could not be gathered accurately or distributed properly. And finally, without people, it is doubtful that the rest of the system could operate for long or be of much use. What all this means is that ‘‘information technology’’ is a fuzzy term that includes more than computer hardware. In this chapter, we concentrate on computer hardware (in the next three sections of the chapter) and software (in the final section). But you should remember that these items must interact with all the other system components to create successful AISs. Simkin, Mark G. (2012-05-01). Core Concepts of Accounting...

Words: 306 - Pages: 2

Free Essay

It Watch

... CONTENTS 1. INTRODUCTION TO VIRTUALIZATION 2. TYPES OF VIRTUALIZATION 3. ADVANTAGES OF VIRTUALIZATION 4. VIRTUALIZATION IN INDIA 5. REFERENCES INTRODUCTION Virtualization is the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources. In layman's term, virtualization allows you to run an independent operating system within an existing operating system using the existing hardware resources. So if you want to learn another operating system like Linux, you can use virtualization to run Linux on top of the existing operating system. Virtualization is the abstraction of IT resources, separating their physical instance and boundaries from their function. Virtualization has brought important innovation to IT Virtualization concept was first developed by IBM in the 1960s to fully utilize mainframe hardware by logically partitioning them into virtual machines. These partitions will allow mainframe computers to perform multiple tasks and applications at the same time.. During the 1980s and 1990s, desktop computing and x86 servers become available and so the virtualization technology was discarded eventually. Client-server applications and the emergence of Windows and Linux made server computing significantly inexpensive. However, new challenges has surfaced which includes high maintenance and management cost, high infrastructure...

Words: 1666 - Pages: 7

Free Essay

Computer Architectures

...computing and reduced instruction set computing. Technologies in the present and the future depend on these architectures for expedited growth, without them society will halt in technological advances. These computing architectures provide the foundations of computer processing, although each having their specific advantages, disadvantages, pros, and cons. Information technology is rapidly growing, providing users and businesses a means to share digital data. Businesses gear towards investing money in all aspects of information technology systems to provide services for their customers. Users use computers as a means to communicate with family or watch the latest movie over the internet. As more digital data is generated annually, hardware and software manufacturers need to enhance their products (Stair 2010). Computing systems, telecommunications networks and information databases essentially need to keep up with incremental growth of data for the future. A computer simply processes what a user tells it to do, so how does that underlying process really work? Simple, the...

Words: 2285 - Pages: 10

Free Essay

A Comparative Study of Cognitive Radio Platforms

...researchers, academia, politicians and the industry. CR promises to bring a paradigm shift in spectrum management policies from command-and-control regime to dynamic and opportunistic spectrum access. Despite more than a decade of research in the CR area, there are too little CR systems ready for the market. This lack of ready CR systems may reflect an overemphasis in the CR literature on theory and simulations with less work done in experimental-basedresearch and publications. In order to fast-track the real-life deployments of CR systems, the research community is now focusing on the development of CR platforms. With different software defined radio (SDR) packages and hardware available, it is confusing to decide which one to build or use. The objective of this paper is to study the design of CR platforms making use available SDR software packages and hardware. Our conclusion is that CR research should now focus on experimental-based results using real-life CR platforms in order to realize market-ready CR systems. Cognitive radio (CR) technology has become one of the hot research topics in wireless communications network over the past twelve years. CR is an intelligent wireless communication system capable of changing its transceiver parameters based...

Words: 4120 - Pages: 17

Premium Essay

Computer Organization

...Computer Organization The dictionary definition of the term “organizing” is “to put together into an orderly, functional, structured whole”. Therefore, this term applies to Computer Organization because it tries “to put together into an orderly, functional, structured whole” the main components of computers and the way computers are organized. Modern computer technology requires professionals of every computing specialty to understand both hardware and software. The interaction between hardware and software at a variety of levels also offers a framework for understanding the fundamentals of computing. Whether our primary interacts is hardware or software, Information Technology, Computer Science or Electrical Engineering, the central ideas in Computer Organization is the same. Thus, the emphasis of this is to show the relationship between hardware and software and to focus on the concepts that are the basis for current computers. The computer lies at the heart of computing. Without it, most of the computing disciplines today would be a branch of theoretical mathematics. To be a professional in any field of computing today, one should not regard the computer as just black box that executes program by magic. We, students of computing should acquire some understanding and appreciation of a computer system’s functional components, their characteristics, their performance, and their instruction. There are practical implications as well. In describing computer systems, a distinguishing...

Words: 1348 - Pages: 6

Free Essay

Vm Ware Case Study

...layer. Operating systems lies on the bottom of the stack and acts as a Graphical User Interface(GUI) between the user and the machine. The new software VM Hypervisor software is built in such a way that it sits in between OS and the hardware. It can directly interact with the hardware and is not build on the top layer of OS. Hence it can individually interact with the hardware without the need of the OS. Therefore VM ware Hypervisor had a high potential of affecting all the core operating systems market since VM ware also came to the bottom of the stack with the launch of Hypervisor. The key aspect of any operating system is to provide the application software a suitable environment. Thus by providing this VM ware has the ability to affect the entire core OS market. VM ware was acquired by EMC in the year 2003 for $635million. In the year 2007, it went public and raised over a billion dollars. 86% of the company share was retained by EMC . Intel and Cisco Systems bought 2.5% and 1.6% stake for $218.5 million and 150$ million respectively. The revenues also doubled in 2007. VM ware now has a potential to be a leader in the market. 2. The ecosystem of the VM ware consisted of Software developers, Hardware vendors and the distribution channel players. By 2007, VM ware has already partnered with more than 500 software and hardware companies, had distribution channel players over 10,000. VM ware’s strategy was to build their relations by partnering was their way of adoption...

Words: 1648 - Pages: 7

Premium Essay

Club It Part One

...Information Systems and Software Applications 1 Software Application and Information System Marguerite Moore Business Information Systems/BIS2 February 21, 2011 Chiedo Ugorji InformationSystems and Software Applications 2 - Please remove. Management Information Services A management department uses a computer based system that provides managers with the tools needed to organize, evaluating, and they run their departments more efficiently. They use software that can look at the past, present, andthefuture information. This is calledthe Management Information Service that includes the software to run the databases, the decision support system, and they also have applications that can run the department of the business more efficiently. These systems (management information systems) provide the department employee with the information to run his operations. It also supports the planning, effective resource...

Words: 978 - Pages: 4

Premium Essay

Info Society

...Vision Paper An Innovative Stay In Touch Software INTRODUCTION In today’s world, with so much information being constantly updated and peoples desire to access this information where they want to has created a demand for a new visionary technology which is fast, convenient and more important up to date. As the movement away from printed media increase and the explosion of PDA devices into the market, there is potential for a new company to link the media world with wireless technology. A new innovative software allowing users to subscribe to the most up to the minute information in an easy user friendly fashion and directly on a piece of hardware that is essential in everyone’s lives, is exactly the answer. I write to you today, The New AT&T, the leading cell phone provider with the most international capabilities to ask that you consider funding our SIT software (stay in touch), which in turn will be implemented on your PDA hardware devices. Our SIT software compatible with your PDA device will enable users to view the most instant and accurate information of newspapers, magazines, bloggs and specialty media sources from all around the world. To this end, I will argue that in the future this technology will offer a powerful tool for individuals that want multiple sources of information from around the world that is easily presented on the hardware device they already own. Being well aware that there are other concepts similar to ours that already exist, we will support...

Words: 1449 - Pages: 6

Premium Essay

Analysis of Multi Level Cloud Computing Service

...model(PaaS), Software- as- a- service model (SaaS), Infrastructure-as-a-Service model (IaaS). IaaS is a third party service model which makes use of hardware, software, servers, storage and other infrastructure modules on behalf of the users on the network. IaaS provides the connected users with a web-based service to create, obliviate and administer storage and systems. Security remains a big issue of concern especially because the other service models run on top of the infrastructure layer. PaaS provides hardware and software equipments required for the development of applications to it’s users over the worldwide web. PaaS provides access to Application Program Interfaces( APIs) and other equipments necessary or developing applications without having to install the developing environment. SaaS gives the connected users access to software/ services available on the cloud. SaaS requires the Web Browser to to access the applications hosted by the cloud. Although this concept provides ease in terms of cost- cutting and low management requirement of systems, the data remains vulnerable to unauthorized interference and misuse. This poses a threat to data security which becomes a great concern on multiple levels and dimensions. This paper aims at highlighting each and every threat to data security in general and the possible defense mechanisms/ solutions employed against the same. INTRODUCTION: Cloud computing is defined as the use of new/ existing computer hardware and virtualization...

Words: 1461 - Pages: 6

Premium Essay

Integrative Network Design Project Part 3

...Integrative Network Design Project As the Integrative Network Design Project moves in to part three the need to evaluate the Patton-Fuller Community Hospital network to identify additional properties and functions. This paper will look at the hardware and software needed to secure the network against electronic threats, will examine the use of Wide Area Networks (WAN) and Local Area Networks (LAN) and the technologies used to implement them, and finally the concepts of data communication networks will be explored. In any organization it is imperative that measures are taken to protect the network from potential threats. Vital information contained on the network may be at risk to potential internal or external network threats. With this stated it is important that the organization determines the safeguards that need to be in place to protect that data. Patton-Fuller Community Hospital will need to evaluate the software and hardware options that are available and will provide the most secure method for protecting the critical data stored on the network. To make an informed decision the types of potential threats must be first identified. There are a number of threats to networks; social engineering, port scanners, packet sniffers, password cracking, trojans, denial of service attacks, server bugs, and super user exploits. Each of these uses techniques designed to access the network and impair the networks ability to function or to obtain vital data. Social engineering...

Words: 827 - Pages: 4

Premium Essay

Computer

...06/06/2013 6/6/2013 ASPECTS OF COMPUTER L I T E R A C Y Violence and Technology, are never good bed fellows. 1 2 6/6/2013 Aspects of computer literacy What is a computer?      what are its limitations what is a program (not necessarily how to program) what is a known as hardware? What is known as software? what a computer can and cannot do How computer illiterate am I?  3 6/6/2013 Aspects of computer literacy One problematic element of many (though not all) "computer literacy" or computer education programs is that they may resort too heavily on rote memorization. Students may be taught, for example, how to perform several common functions (e.g.: Open a file, Save a file, Quit the program) in very specific ways, using one specific version of one specific program. 1 06/06/2013 4 6/6/2013 Aspects of computer literacy When a graduate of such a program encounters a competing program, or even a different version of the same program, they may be confused or even frightened by the differences from what they learned. 5 6/6/2013 Aspects of computer literacy This is one reason why major computer and software firms such as Apple Computer and Microsoft consider the educational market important: The often time-limited computer education provided in schools most often lends itself to note memorization, creating a sort of vendor lock-in effect whereby graduates are afraid to switch to competing computer systems. 6 6/6/2013 ...

Words: 2401 - Pages: 10

Premium Essay

Apple

...Apple Inc. designs, manufactures, and markets personal computers, mobile communication devices, and portable digital music and video players and sells a variety of related software, services, peripherals, and networking solutions. The Company sells its products worldwide through its online stores, its retail stores, its direct sales force, and third-party wholesalers, resellers, and value-added resellers. (Source: Company Form 10-K) Refer to the financial reports of Apple, Inc. for the year ended September 25, 2010 +Concepts+ a. In your own words, define "revenues." Explain how revenues are different from "gains." b. Describe what it means for a business to "recognize" revenues. What specific accounts and financial statements are affected by the process of revenue recognition? Describe the revenue recognition criteria outline in the FASB's Statement of Concepts No. 5. c. Refer to the Revenue Recognition discussion in Note 1. In general, when does Apple recognize revenue? Explain Apple's four revenue recognition criteria. Do they appear to be aligned with the revenue recognition criteria you described in part b, above? d. What are multiple-element contracts and why do they pose revenue recognition problems for companies? e. In general, what incentives do managers have to make self-serving revenue recognition choices? Refer to the financial reports of Apple, Inc. for the year ended September 25, 2010 +Process+ .f. Refer to Apple's revenue recognition footnote...

Words: 1834 - Pages: 8

Premium Essay

Crypotogohy

...“PALLADIUM CRYPTOGRAPHY” 1: ABSTRACT As we tend towards a more and more computer centric world, the concept of data security has attained a paramount importance. Though present day security systems offer a good level of protection, they are incapable of providing a “trust worthy” environment and are vulnerable to unexpected attacks. Palladium is a content protection concept that has spawned from the belief that the pc, as it currently stands, is not architecturally equipped to protect a user forms the pitfalls and challenges that an all-pervasive network such as the Internet poses. As a drastic change in pc hardware is not feasible largely due to economic reasons, palladium hopes to introduce a minimal change in this front. A paradigm shift is awaited in this scenario with the advent of usage of palladium, thus making content protection a shared concern of both software and hardware. In the course of this paper the revolutionary aspects of palladium are discussed in detail. 2: INTRODUCTION Cryptography is the method in which a message or file, called plain text, is taken and encrypted into cipher text in such a way that only authorized people know how to convert it back to plain text. This is done commonly in four ways: Secret key cryptography, public key cryptography, one way function cryptography and digital signatures. Unless the encryption technique used is very complex it is possible, with some effort, for crackers to decrypt files. Palladium is the code name...

Words: 1940 - Pages: 8

Premium Essay

Multilevel Feedback Queue

...Hardware and software share responsibility for managing I/O operations and devices. Why is this hardware support required for this activity? Answer the question in a journal entry The fundamental operation of the operating system (OS) is to abstract the hardware to the programmer and user. The operating system provides generic interfaces to services provided by the underlying hardware. In a world without operating systems, every programmer would need to know the most intimate details of the underlying hardware to get anything to run. Worse still, their programs would not run on other hardware, even if that hardware has only slight differences. Hardware definition-It refers to the physical elements of a computer. This is also sometime called the machinery or the equipment of the computer. Examples of hardware in a computer are the keyboard, the monitor, the mouse and the processing unit. However, most of a computer's hardware cannot be seen; in other words, it is not an external element of the computer, but rather an internal one, surrounded by the computer's casing (tower). A computer's hardware is comprised of many different parts, but perhaps the most important of these is the motherboard. The motherboard is made up of even more parts that power and control the computer Software definition-It refers to all the electronic instructions that tell the hardware how to perform a task. These instructions come from a software developer in the form that will be accepted by the platform...

Words: 630 - Pages: 3

Premium Essay

Ten Phases Of System Development Life Cycle (SDLC)

...the of six main stages to creating hardware system only, a software element only or that mixes with other software components to create the whole system of both to meet or exceed customer’s expected values. From the below figure 1 we can understand on the basic six phases...

Words: 1674 - Pages: 7